Analysis
-
max time kernel
106s -
max time network
107s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/07/2024, 04:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
silly.exe
Resource
win11-20240611-en
4 signatures
1800 seconds
General
-
Target
silly.exe
-
Size
98KB
-
MD5
1ef07f5606ad2f00dac8860c39bc34ad
-
SHA1
136243d1ec2aa34ffe496ed77bcf046a736fb30d
-
SHA256
613c4e1384fa9adabf6db2a72556fc996755c1906f33da09ee03294eca4f07e8
-
SHA512
dc7d9393107c73bde03cd58caef9317a808bd311cf1bb3333cd7e71ed90c13a2044800770d97d525ed04368d8251f36fc123c9c3d8d307566da5faf26eb6e0c6
-
SSDEEP
3072:z3zEMMRh+uU+XvGVfpXcFzJ3dMO9GeUP0/vG6PDH:z34MShC6+RXE3zPUcv1bH
Score
6/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: silly.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1392 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1392 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\silly.exe"C:\Users\Admin\AppData\Local\Temp\silly.exe"1⤵
- Enumerates connected drives
PID:460
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004E01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:4064
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:560
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:4568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DevicesFlow -s DevicesFlowUserSvc1⤵PID:1988